A collection of beautified and commented samples of malware implemented in Bash
☆23Apr 4, 2023Updated 3 years ago
Alternatives and similar repositories for bash-malware
Users that are interested in bash-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- malicious bash scripts☆10Apr 3, 2022Updated 4 years ago
- ☆27Nov 26, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 「🚪」Linux Backdoor based on ICMP protocol☆62Dec 7, 2024Updated last year
- eBPF-https is an open source web application firewall (WAF)☆15Sep 11, 2024Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- ☆65Jul 3, 2024Updated last year
- ☆19Jul 29, 2022Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Learning Go by implementing a Chess Engine☆15Feb 23, 2023Updated 3 years ago
- ⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")☆19Sep 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- Doubango VoIP framework☆21Feb 19, 2022Updated 4 years ago
- ☆84May 20, 2025Updated 11 months ago
- ☆13Jun 12, 2023Updated 2 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- **DEPRICATED** anydown for electron☆15Mar 26, 2018Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- ☆15Jul 28, 2024Updated last year
- Can machine learning make UI tests easier? This repo is the first step to answer this question.☆11Dec 8, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Apr 2, 2022Updated 4 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- ☆20Aug 21, 2021Updated 4 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 6 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- A library for triggering DOM events.☆24May 6, 2017Updated 8 years ago
- ☆13Aug 31, 2024Updated last year
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago